You are on page 1of 3

8/6/22, 4:41 AM IoT Security 1.

1 Chapter 3 Quiz Flashcards | Quizlet

4
IoT Security 1.1 Chapter 3 Quiz Upgrade Study Profi

IoT Security 1.1 Chapter 3 Quiz

Find free textbook solutions


Solve tough problems on your own with expert-written solutions for your textbook.

Search on Quizlet

Terms in this set (22)

An administrator wants to role-based


implement an access control
model that makes access
decisions based on the role
and responsibilities of an
individual within an
organization. Which access
control model best addresses
https://quizlet.com/554899003/iot-security-11-chapter-3-quiz-flash-cards/?i=4h7ntj&x=1jqY 1/5
8/6/22, 4:41 AM IoT Security 1.1 Chapter 3 Quiz Flashcards | Quizlet
architecture? (Choose two.)

What is a key difference An embedded device is programmed for one


between an embedded device specific purpose, whereas a prototyping device is
and a prototyping device? designed to perform different functions.

IoT
WhichSecurity 1.1 Chapter 3 Quiz
two programming C, Java Study
languages are examples of
compiled languages? (Choose
two.)

What are three potential damage, tampering, environment manipulation


vulnerabilities related to a
hardware sensor? (Choose
three.)

Which type of vulnerability is buffer overflow


present when a programmer
does not account for the size
of the input that a user might
enter?

Which two commercial IoT VxWorks, Windows 10 IoT Core


operating systems support
processors from multiple
manufacturers? (Choose two.)

Which two scripting languages shell script, PowerShell


are designed to be executed
directly under an operating
system? (Choose two.)

https://quizlet.com/554899003/iot-security-11-chapter-3-quiz-flash-cards/?i=4h7ntj&x=1jqY 3/5
8/6/22, 4:41 AM IoT Security 1.1 Chapter 3 Quiz Flashcards | Quizlet
commands. Which type of
vulnerability best describes this
situation?

IoT
WhichSecurity 1.1takes
type of attack Chapter 3 Quiz
privilege escalation Study
advantage of vulnerabilities in
servers to grant unauthorized
users higher than approved
levels of access?

https://quizlet.com/554899003/iot-security-11-chapter-3-quiz-flash-cards/?i=4h7ntj&x=1jqY 5/5

You might also like